Societal vulnerability to computer system failures

The world has become more dependent on computers which are active elements in bigger systems on which human lives depend - such as critical care units in hospitals, defense systems or air traffic control systems. Hence, the need to assure correct, reliable and safe operation has become more critical. With this need has come an increase in the attention paid to computer systems vulnerabilities and to societal vulnerability. While exports disagree over whether society is more vulnerable than resilient to failure of today's increasingly interconnected computer and communication systems, the consensus seems to be that, at the very least, the problem bears watching. This paper presents directions for exploring these problems further: a societal risk analysis, a focus on one or more critical computer systems, and the formation of interdisciplinary discussion forums.

[1]  D. Elliott Bell,et al.  Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .

[2]  Eric J. Novotny,et al.  Resiliency of the computerized society , 1983, AFIPS '83.

[3]  Jonathan K. Millen,et al.  Security Kernel validation in practice , 1976, CACM.

[4]  James Marting,et al.  Security, Accuracy, and Privacy in Computer Systems , 1973 .

[5]  Nancy G. Leveson,et al.  Analyzing Safety and Fault Tolerance Using Time Petri Nets , 1985, TAPSOFT, Vol.2.

[6]  Adele Goldberg ACM President's letters , 1985, CACM.

[7]  Willis H. Ware,et al.  Information systems security and privacy , 1984, CACM.

[8]  Lance J. Hoffman,et al.  Modern methods for computer security and privacy , 1973 .

[9]  Lance J. Hoffman,et al.  Impacts of information system vulnerabilities on society , 1899, AFIPS '82.

[10]  Stephen T. Walker The advent of trusted computer operating systems , 1980, AFIPS '80.

[11]  Lawrence Robinson,et al.  Proof techniques for hierarchically structured programs , 1977, CACM.

[12]  Rob Kling,et al.  Value conflicts and social choice in electronic funds transfer system developments , 1978, CACM.

[13]  Jonathan K. Millen,et al.  Verifying Security , 1981, CSUR.

[14]  Dorothy E. Denning,et al.  Cryptography and Data Security , 1982 .

[15]  David H. Brandin ACM president's letter: the horse or the herring , 1982, CACM.

[16]  Dorothy E. Denning,et al.  A lattice model of secure information flow , 1976, CACM.

[17]  M. Granger Morgan Computer-Based National Information Systems: Technology and Public Policy Issues , 1982 .

[18]  Ralph Howard,et al.  Data encryption standard , 1987 .